CVE-2026-21695: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in kromitgmbh titra
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
AI Analysis
Technical Summary
CVE-2026-21695 affects Titra, an open-source project time tracking software developed by kromitgmbh. The vulnerability is a Mass Assignment flaw categorized under CWE-915, which involves improper control over modification of dynamically-determined object attributes. Specifically, in Titra versions prior to 0.99.50, an API endpoint accepts a customfields parameter that is expected to be an Object. This parameter is merged into the database document using the JavaScript spread operator (...customfields) without validating the keys inside the object. Although the type of customfields is checked, there is no whitelist or restriction on which keys can be included. This allows authenticated users to inject or overwrite sensitive fields such as userId, hours, and state within time entries, effectively bypassing business logic constraints designed to protect data integrity. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The flaw could lead to unauthorized modification of time tracking records, potentially affecting billing, payroll, or project management processes. The issue was addressed and fixed in Titra version 0.99.50 by implementing proper validation and restrictions on the customfields keys. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but notable impact on integrity, with low attack complexity and requiring privileges.
Potential Impact
For European organizations using Titra versions below 0.99.50, this vulnerability poses a risk to the integrity of time tracking data. Attackers with valid credentials can manipulate critical fields such as userId, hours worked, and state of time entries, potentially leading to inaccurate billing, payroll errors, project mismanagement, and compliance issues. This could result in financial losses, internal disputes, and regulatory scrutiny, especially under strict European data protection and labor laws. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise can undermine trust in operational data and reporting. Organizations relying on Titra for time tracking in sectors like consulting, legal, or engineering services—where accurate time records are essential—may face significant operational disruption. The requirement for authentication limits exposure to insider threats or compromised accounts, but the ease of exploitation once authenticated makes it critical to address. No known exploits in the wild reduce immediate risk, but the presence of a public CVE and source code availability could facilitate future attacks.
Mitigation Recommendations
European organizations should immediately upgrade Titra installations to version 0.99.50 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict access controls to limit who can authenticate and access the vulnerable API endpoints. Monitor logs for unusual modifications to time entries, especially changes to userId, hours, or state fields. Employ application-layer firewalls or API gateways to inspect and restrict payloads containing unexpected keys in the customfields parameter. Conduct regular audits of time tracking data to detect anomalies indicative of manipulation. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Educate users about the importance of credential security and monitor for insider threats. Finally, consider isolating the time tracking system within segmented network zones to limit lateral movement if an attacker gains access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2026-21695: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in kromitgmbh titra
Description
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
AI-Powered Analysis
Technical Analysis
CVE-2026-21695 affects Titra, an open-source project time tracking software developed by kromitgmbh. The vulnerability is a Mass Assignment flaw categorized under CWE-915, which involves improper control over modification of dynamically-determined object attributes. Specifically, in Titra versions prior to 0.99.50, an API endpoint accepts a customfields parameter that is expected to be an Object. This parameter is merged into the database document using the JavaScript spread operator (...customfields) without validating the keys inside the object. Although the type of customfields is checked, there is no whitelist or restriction on which keys can be included. This allows authenticated users to inject or overwrite sensitive fields such as userId, hours, and state within time entries, effectively bypassing business logic constraints designed to protect data integrity. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The flaw could lead to unauthorized modification of time tracking records, potentially affecting billing, payroll, or project management processes. The issue was addressed and fixed in Titra version 0.99.50 by implementing proper validation and restrictions on the customfields keys. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but notable impact on integrity, with low attack complexity and requiring privileges.
Potential Impact
For European organizations using Titra versions below 0.99.50, this vulnerability poses a risk to the integrity of time tracking data. Attackers with valid credentials can manipulate critical fields such as userId, hours worked, and state of time entries, potentially leading to inaccurate billing, payroll errors, project mismanagement, and compliance issues. This could result in financial losses, internal disputes, and regulatory scrutiny, especially under strict European data protection and labor laws. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise can undermine trust in operational data and reporting. Organizations relying on Titra for time tracking in sectors like consulting, legal, or engineering services—where accurate time records are essential—may face significant operational disruption. The requirement for authentication limits exposure to insider threats or compromised accounts, but the ease of exploitation once authenticated makes it critical to address. No known exploits in the wild reduce immediate risk, but the presence of a public CVE and source code availability could facilitate future attacks.
Mitigation Recommendations
European organizations should immediately upgrade Titra installations to version 0.99.50 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict access controls to limit who can authenticate and access the vulnerable API endpoints. Monitor logs for unusual modifications to time entries, especially changes to userId, hours, or state fields. Employ application-layer firewalls or API gateways to inspect and restrict payloads containing unexpected keys in the customfields parameter. Conduct regular audits of time tracking data to detect anomalies indicative of manipulation. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Educate users about the importance of credential security and monitor for insider threats. Finally, consider isolating the time tracking system within segmented network zones to limit lateral movement if an attacker gains access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-02T18:45:27.397Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695eeee107b8a419a7712f38
Added to database: 1/7/2026, 11:40:17 PM
Last enriched: 1/7/2026, 11:55:29 PM
Last updated: 1/9/2026, 12:01:14 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22710: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Wikibase Extension
LowCVE-2026-0733: SQL Injection in PHPGurukul Online Course Registration System
MediumCVE-2026-0732: Command Injection in D-Link DI-8200G
MediumCVE-2026-0731: NULL Pointer Dereference in TOTOLINK WA1200
MediumCVE-2026-0730: Cross Site Scripting in PHPGurukul Staff Leave Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.